Showing 8,881 - 8,900 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 8881

    Reconsidering the “Critical-Corrective” Article of the Single Article Approved in September 2017 on “Iranian Citizenship of Children Born to Iranian Women Married to Non-Iranian M... by Mostafa Daneshpajooh

    Published 2021-01-01
    “…However, the conceptual ambiguities and implementation problems of this single article caused the legislator to repeal the previous single article by approving a new article in 1398.This article is an attempt to illustrate the article’s strengths and weaknesses by reconsidering the “critical-corrective” nature of the new single article, and especially to explain its incompatibility with the forty-first principle of the constitution; it is finally suggested that due to the truth and nature of citizenship and more compatibility with Article 41 of the Constitution, maternal lineage, like paternal lineage, secure the Iranian citizenship to the child.…”
    Get full text
    Article
  2. 8882

    Design and implementation of hardware-based dynamic instruction set randomization framework by San DU, Hui SHU, Fei KANG

    Published 2017-11-01
    “…All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.…”
    Get full text
    Article
  3. 8883

    Pupils’ approach to teachers’ role as motivating factor in foreign language classes by Virginija Jurate Pukeviciute, Migle Antaneliene

    Published 2017-02-01
    “…Moreover, it turned out that the schoolchildren feel less secure talking of interaction with teachers: they usually turn to the teachers only for subject matters; they do not always feel free in the classroom. …”
    Get full text
    Article
  4. 8884

    Privacy-preserving scheme for logistics systems based on 2D code and information hiding by Wen-bo YAN, Yuan-zhi YAO, Wei-ming ZHANG, Neng-hai YU

    Published 2017-11-01
    “…With regard to the user privacy leakage problem in existing logistics systems,a privacy-preserving scheme for logistics systems based on 2D code and information hiding was proposed.The information hiding tech-nique was used in the proposed scheme to embed the user privacy information into the 2D code on the logistics waybill to achieve access control.To secure the user privacy information,a JPEG image stenographic algorithm for 2D code was designed.Experimental results demonstrate that this algorithm can guarantee the high undetectable performance and the stego 2D code can be correctly decoded.Using the proposed scheme,the institution or the per-son that has the access right can obtain the important privacy information so that the express can be delivered cor-rectly and the user privacy can be preserved.…”
    Get full text
    Article
  5. 8885

    Az európai kormányzás új lehetősége - az Európai Területi Együttműködés jogi keretei az új európai kohéziós politikában (New Opportunity of the European Governance – The Legal Fram... by Zsuzsanna Fejes

    Published 2014-09-01
    “…The study summarizes the advantages of EGTC, how to response a new alternative to increase the efficiency, legitimacy and transparency of the activities of territorial cooperation, and at the same time secures legal certainty. The revised EGTC Regulation (1302/2013/EU) contains the most important pieces of legislation related to the cohesion policy and most of the programmes funded by the EU in the period 2014-2020.…”
    Get full text
    Article
  6. 8886
  7. 8887

    Extended Perturbed Mixed Variational-Like Inequalities for Fuzzy Mappings by Muhammad Bilal Khan, Muhammad Aslam Noor, Khalida Inayat Noor, Ahmad Termimi Ab Ghani, Lazim Abdullah

    Published 2021-01-01
    “…In the end, some new and previously known existence results and algorithms are also studied. Results secured in this paper can be regarded as purification and development of previously familiar results.…”
    Get full text
    Article
  8. 8888

    Pratique des activités d’orientation-conseil et projet professionnel de l’élève au Cameroun by Rodrigue Mbwassak

    Published 2022-08-01
    “…This research poses the problem of guidance counsellors accompanying students in the co-construction of their professional projects preparing them for a secure professional integration, if we refer to the difficulties of choice of training and socio-professional integration experienced by graduates nowadays. …”
    Get full text
    Article
  9. 8889

    Technical solution and application of 5G slicing private network based on cloud-network integration by Kai CHEN

    Published 2022-07-01
    “…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
    Get full text
    Article
  10. 8890

    La emigración académica España-Ecuador durante el período de recesión económica: España-Ecuador durante el período de recesión económica: España-Ecuador durante el ¿una geoes... by PÉREZ-GAÑÁN, Rocío, MORENO, Gorka

    Published 2018-05-01
    “…This change of direction is not a coincidence; it is in response to a geographic strategy which is articulated around two fundamental axes: securing teaching and research experience, which, in today’s Spain, is difficult to find yet key to enter or continue in Academia, and enjoying a quality of life which is not possible in Spain. …”
    Get full text
    Article
  11. 8891

    Multi-authority attribute-based encryption scheme with policy dynamic updating by Xi-xi YAN, Yuan LIU, Zi-chen LI, Yong-li TANG

    Published 2017-10-01
    “…Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.…”
    Get full text
    Article
  12. 8892

    Address overloading-based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Zhibin ZUO, Yingying MA

    Published 2022-03-01
    “…Aiming at the problem that the most existing forwarding verification mechanisms in software-defined network (SDN) verified packets hop-by-hop by incorporating new secure communication protocols, which incurred significant computation and communication overhead, an address overloading-based forwarding verification mechanism was proposed.The flow runtime was divided into consecutive random intervals by the ingress switch via overloading address fields of packet, basing on overloading address, packets were forwarded by each subsequent switch, and the controller sampled the packets forwarded by ingress and egress switch in the interval to detect abnormal behavior on the path.Finally, the proposed mechanism and simulation network was implemented and evaluated.Experiments show that the mechanism achieves efficient forwarding and effective anomaly detection with less than 8% of additional forwarding delays.…”
    Get full text
    Article
  13. 8893

    Implementing Youth Mental Health First Aid Training in Cooperative Extension Programs by Anne M. Iaccopucci, Monica M. Lobenstein, Kendra M. Lewis, Kea Norrell-Aitch

    Published 2024-12-01
    “…Experienced program leaders suggest partnering with a supportive organization, securing long-term funding, and establishing dedicated staff for program delivery.…”
    Get full text
    Article
  14. 8894

    Development of an Intelligent Communication Platform for Remote Practical Work in Education: Integrating AR, VR, and Cloud Technologies by El Gourari Abdelali, Ezzini Mustapha, Raoufi Mustapha, Skouri Mohammed, Achki Samira, Ait Lahcen Yassine, Mouachi Raja

    Published 2024-01-01
    “…The platform integrates with existing learning management systems (LMS) to provide a flexible and secure learning environment. A systematic development process, guided by user feedback, ensures continuous improvement and alignment with educational goals.…”
    Get full text
    Article
  15. 8895

    Homomorphic Signature With Designated Evaluator by Kazuma Shiraishi, Keisuke Hara, Toi Tomita, Kyosuke Yamashita, Junji Shikata

    Published 2025-01-01
    “…Additionally, we achieve a post-quantum variant of this homomorphic signature scheme with a designated evaluator, provided that the underlying building blocks are post-quantum secure. This represents the first post-quantum realization of such a scheme.…”
    Get full text
    Article
  16. 8896

    Identity-based cloud storage integrity checking from lattices by Miaomiao TIAN, Chuang GAO, Jie CHEN

    Published 2019-04-01
    “…With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.…”
    Get full text
    Article
  17. 8897

    INTERVENTION PROGRAMS IN THE MONETARY POLICY OF THE EUROSYSTEM

    Published 2019-12-01
    “…Large asset purchase programs and other intervention purchases of securities are discussed, and the risks of such policies for the long-term stability of the financial system are also addressed. …”
    Get full text
    Article
  18. 8898

    5-pass zero-knowledge identity authentication scheme based on matrix completion problem by Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG

    Published 2021-11-01
    “…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
    Get full text
    Article
  19. 8899

    Renewable energy in chemical industrial buildings for cost performance by Bernadette Detty Kussumardianadewi, Albert Eddy Husin, Lastarida Sinaga

    Published 2025-01-01
    “…Blockchain provides distributed, secure, permissioned transactional ledgers, that successfully deal with these problems. …”
    Get full text
    Article
  20. 8900

    RELIABILITY ANALYSIS FOR JACK-UP GEARBOX BASED ON COPULA BAYESIAN NETWORK by ZHANG Qing, LIU Chao, SUN YuanTao, QIN XianRong

    Published 2018-01-01
    “…The failure probability of gearbox was calculated by CBN,and the result showed that it was more secure and accurate than the traditional BN method.…”
    Get full text
    Article